Show all of the processes on the system along with their PIDs. However, it differs in that it presents output in a tree structure that shows how processes are related to each other and in that it provides less detailed information about each process than does ps.pstree

Lost processes with their pidps -A | lessps -a | less

Kill a process with pid 8280kill -SIGTERM 8280
orkill -9 8280

The a option tells ps to list the processes of all users on the system rather than just those of the current user, The u option tells ps to provide detailed information about each process. The x option adds to the list processes that have no controlling terminal.ps aux | less

The top chunk of information give system statistics, such as system load and the total number of tasks. You can easily see that there is 1 running process, and 55 processes are sleeping (aka idle/not using CPU resources). The bottom portion has the running processes and their usage statistics.top

To see a tree view, where hierarchal relationships are illustrated, we can run the command with these options:ps axjf

Enthusiasts flocked to the event at Strathmore University. The attendance was made more of blockchain techies, programmers, lawyers, and bounty hunters :). Well, most of us just had a vague idea of what blockchains were. Maybe they are bitcoins, or are they crypto-currencies? And of course 99% though of them as alternative currencies.

What we refused to understand is that blockchains is a technology that allows distributed immutable smart contracts. The nodes performing the distribution get points for participating in the blockchain grid. And those points are what are generally called crypocurrencies. And the process of writing the distributed ledger for any blockchain transaction is what is called mining. You get some sort of points when you mine. Depending on the network you use, the point can be called a bitcoin, an ether, etc. Well easy, is it not?

Well, my explanation my be off hook. So here is what Wikipedia has to say; “Blockchain is a distributed database that maintains a continuously-growing list of ordered records called blocks. Each block contains a timestamp and a link to a previous block. By design blockchains are inherently resistant to modification of the data – once recorded, the data in a block cannot be altered retroactively”

Prof. Nii Quaynor, one of the Internet Pioneers in Africa set the scene by showing how adoption of new technology happens around the world. It seemed just like in the adoption of the internet, Africa was alos lugging behind in embracing blockchain technology.

The blockchain legends were around. The one who generated the most interest was Vitalik Buterin, the 22 year old co-founder of Ethereum. Ethereum is a publicly assessable, distributed blockchain computing platform that implements smart contract functionality.

So I had to engage Vitalik. “What is your take on hard forks, especially the hard fork that was done on Ethereum when DAO was hacked. Does that jeopardise the credibility of blockchains which are billed to have distributed immutable transactions. Example if we implement a banking platform, or land registry system using Ethereum, the public will just claim transactions are reversible”.

Vitalik’s answer was measured and calm, very pragmatic I must say from a 22 year old. He said that systems have to be adaptable. And as the popularity of blockchain technologies mature, including ethereum, it will be more difficult to apply hard forks. And hard forks are a matter of political decisions.

The public was surprised to learn from the government of Kenya, through a statement read on behalf of the Minister of ICT Joe Mucheru that the government is working with IBM to deploy blockchain applications in government service. Three areas they are working on is land, education, and medical records.

The security firm ESET has warned on an increase of infected e-mails containing a malicious zipped attachment called Nemucod. It downloads ransomware, for example, TeslaCrypt or Locky. When opened, it encrypts the data on the victim’s computer and demand ransom for decryption. The virus has been detected in Europe, North America, Australia, Japan, and Africa . According to an Intel security report, global ransomware cases increased almost 170% in 2015. Bitdefender, an internet security company, found that almost half of the victims surveyed across Europe and the US have paid extortionists to recover data .

Thunderbird, Mozilla Suite or SeaMonkey: Use the “Profile Manager” shortcut located in the Start -> Programs Menu (if available) or use the below instructions, substituting thunderbird.exemozilla.exe or seamonkey.exe in place of firefox.exe.

Firefox: Open the Windows “Start” menu, select “Run” (on Windows Vista, use “Start Search” or enable the Run box, as described here) then type and enter one of the following:

firefox.exe -profilemanager

firefox.exe -P

For a zip install or if the above instructions do not work, include the full path to the executable surrounded by quotation marks in the “Run” (or Vista “Start Search”) box, as in this Firefox example:

Here is a list of very cool stuff that is enjoyable to do on a computer. ou can help expand it by leaving your comments.

1. Create a new notepad file and do not rename it. Let the name remain ‘New Text Document.txt’ Open the file and write “Kibaki hid the facts” without the quotation marks. Then save the file. Who permitted Micr0$oft to get involved in politics?2. Did you know you can erase CD-R disks and re-write data to them?